MedusaLocker

Malware updated 2 months ago (2024-10-04T18:00:54.191Z)
Download STIX
Preview STIX
MedusaLocker is a potent malware, first observed in 2019, that primarily targets the healthcare sector. It operates as a Ransomware-as-a-Service (RaaS), often using the double extortion method for monetary gain. This ransomware has been particularly effective during periods of disorder and confusion such as the COVID-19 pandemic, according to a February 2023 report by the US Department of Health and Human Services. MedusaLocker should not be confused with another similarly named RaaS, Medusa, which was first observed in 2021. A new variant of MedusaLocker was discovered by PCrisk, which appends the .crypto1317 extension and drops a ransom note named How_to_back_files.html. Like other ransomware, it terminates specific services by referencing a hardcoded list of services. This variant uses the same chat and leak site URLs as the original MedusaLocker ransomware. The Medusa group's RaaS platform, different from the original MedusaLocker, has been active since late 2022. The threat posed by MedusaLocker extends globally, with organizations being targeted by financially motivated threat actors. Cisco Talos analysis found instances of staggering $5 million ransom demands. The tool has been used by various ransomware operations, including AvosLocker, BlackCat, Trigona, and LockBit. These strains reflect global trends seen in Singapore's threat landscape, where LockBit, DeadBolt, and MedusaLocker are among the common models deployed.
Description last updated: 2024-10-04T17:16:21.339Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Medusa is a possible alias for MedusaLocker. Medusa, a threat actor group known for its malicious activities, has been increasingly involved in multiple high-profile cyber attacks. In November 2023, Medusa and other groups like LockBit and ALPHV (BlackCat) exploited a zero-day vulnerability, the Citrix Bleed (CVE-2023-4966), leading to numerou
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
RaaS
Encrypt
Encryption
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Lockbit Malware is associated with MedusaLocker. LockBit is a malicious software, or malware, known for its damaging and exploitative functions. It infiltrates systems via dubious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or hold data hostage for ransom. The LockBit Unspecified
2
Source Document References
Information about the MedusaLocker Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
InfoSecurity-magazine
2 months ago
Securityaffairs
4 months ago
Securityaffairs
4 months ago
CERT-EU
a year ago
CERT-EU
10 months ago
Unit42
10 months ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Quick Heal Technologies Ltd.
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago